[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-3466Date: (C)2014-06-16   (M)2024-02-22


Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1030314
SECUNIA-58340
SECUNIA-58598
SECUNIA-58601
SECUNIA-58642
SECUNIA-59016
SECUNIA-59021
SECUNIA-59057
SECUNIA-59086
SECUNIA-59408
SECUNIA-59838
SECUNIA-60384
BID-67741
DSA-2944
RHSA-2014:0594
RHSA-2014:0595
RHSA-2014:0684
RHSA-2014:0815
SUSE-SU-2014:0758
SUSE-SU-2014:0788
USN-2229-1
http://linux.oracle.com/errata/ELSA-2014-0594.html
http://linux.oracle.com/errata/ELSA-2014-0595.html
http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/
http://www-01.ibm.com/support/docview.wss?uid=swg21678776
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096155
http://www.gnutls.org/security.html
http://www.novell.com/support/kb/doc.php?id=7015302
http://www.novell.com/support/kb/doc.php?id=7015303
https://bugzilla.redhat.com/show_bug.cgi?id=1101932
https://www.gitorious.org/gnutls/gnutls/commit/688ea6428a432c39203d00acd1af0e7684e5ddfd
openSUSE-SU-2014:0763
openSUSE-SU-2014:0767

CWE    1
CWE-119
OVAL    17
oval:org.secpod.oval:def:1600120
oval:org.secpod.oval:def:20723
oval:org.secpod.oval:def:1500629
oval:org.secpod.oval:def:702044
...

© SecPod Technologies